Описание
An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:nibbleblog:nibbleblog:4.0.5:*:*:*:*:*:*:*
EPSS
Процентиль: 66%
0.00506
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94
Связанные уязвимости
CVSS3: 7.2
github
больше 3 лет назад
An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").
EPSS
Процентиль: 66%
0.00506
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94